Movatterモバイル変換


[0]ホーム

URL:


US9811958B1 - Apparatus enabling secure wireless access to an enclosure - Google Patents

Apparatus enabling secure wireless access to an enclosure
Download PDF

Info

Publication number
US9811958B1
US9811958B1US15/662,641US201715662641AUS9811958B1US 9811958 B1US9811958 B1US 9811958B1US 201715662641 AUS201715662641 AUS 201715662641AUS 9811958 B1US9811958 B1US 9811958B1
Authority
US
United States
Prior art keywords
access
enclosure
access code
customer
hash digest
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US15/662,641
Other versions
US20170323502A1 (en
Inventor
David R. Hall
Mark Hall
Craig Boswell
Joe Fox
Corey Webb
Jedediah Knight
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Richmond Valley LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/532,523external-prioritypatent/US20150235173A1/en
Priority claimed from US14/533,268external-prioritypatent/US20150235172A1/en
Application filed by IndividualfiledCriticalIndividual
Priority to US15/662,641priorityCriticalpatent/US9811958B1/en
Application grantedgrantedCritical
Publication of US9811958B1publicationCriticalpatent/US9811958B1/en
Publication of US20170323502A1publicationCriticalpatent/US20170323502A1/en
Assigned to HALL LABS LLCreassignmentHALL LABS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HALL, MARK
Assigned to HALL LABS LLCreassignmentHALL LABS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BOSWELL, CRAIG
Assigned to HALL LABS LLCreassignmentHALL LABS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HALL, DAVID R.
Assigned to HALL LABS LLCreassignmentHALL LABS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HALL, DAVID R.
Assigned to HALL LABS LLCreassignmentHALL LABS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: KNIGHT, Jedediah
Assigned to HALL LABS LLCreassignmentHALL LABS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: FOX, JOE
Assigned to HALL LABS LLCreassignmentHALL LABS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: FOX, JOE
Assigned to RICHMOND VALLEY LLCreassignmentRICHMOND VALLEY LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HALL LABS LLC
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

An apparatus for more efficiently enabling secure access to an enclosure is described herein. The apparatus may include a wireless transmitter in a selectably opaque container, a wireless transceiver, a GPS receiver, an NFC transmitter and/or receiver, one or more hardware processors, and hardware memory. The hardware memory stores instructions for receiving a current location of the apparatus and comparing that location to a delivery address of the enclosure. As the location is within a certain range of the delivery address the apparatus sends a request to a cloud-based server for a hash digest masking an acceptable input for an access control mechanism associated with the enclosure. The apparatus receives the hash digest and forwards it to the access control mechanism via the wireless transmitter. Computer executable code for handling such tasks, and a cloud-based server for generating the hash digest, are also described herein.

Description

RELATED APPLICATIONS
This application is a continuation-in-part of U.S. patent application Ser. No. 14/532,523 filed on Nov. 4, 2014 and entitled “Automated Tracking-Number Based Administration of Access Codes;” Ser. No. 14/533,247 filed on Nov. 5, 2014 and entitled “Tracking-Number Extraction Facilitating Administration of Access Codes;” Ser. No. 14/533,268 filed on Nov. 5, 2014 and entitled “System and Method for Detecting Potentially Unauthorized Access to an Enclosure;” Ser. No. 14/533,291 filed on Nov. 5, 2014 and entitled “System and Method for Communicating and Authenticating an Access Code”; and Ser. No. 14/533,324 filed on Nov. 5, 2014 and entitled “Access Code Administration and Sharing.”
FIELD OF THE INVENTION
This invention relates to systems and methods for efficiently delivering goods to recipients, administering access codes to provide access to enclosures, and preventing unauthorized access to enclosures.
BACKGROUND
In modern transport and shipping networks, freight is shipped with relative efficiency between major ports, stations, or hubs using ships, airplanes, trains, trucks, or other vehicles of mass transport. This efficiency typically ends or is greatly reduced when goods reach their final port, station, or hub, where they need to be transported to their final destination. The last leg of delivery, frequently referred as the “last mile,” is typically the most inefficient part of the journey, incurring by some estimates twenty-eight percent of the total shipping costs. This relative inefficiency is often referred to as the “last mile problem.” The last mile problem exists not only in freight networks, but also in telecommunication, utility, and public transportation networks.
In freight networks, the last mile may be fraught with challenges not only in terms of delivering goods, but also ensuring that goods are delivered in a way that limits risk and/or cost to a retailer and/or shipping company. For example, if goods are left on a customer's doorstep but are stolen or damaged prior to retrieval by the customer, a retailer may be responsible to replace the goods, or have a policy to replace the goods to maintain customer relations. This may incur significant costs to the retailer. For this reason, some retailers may require a customer signature or other verification to indicate that a customer has taken possession of delivered goods, particularly for expensive or fragile items. Unfortunately, such a requirement may dramatically increase shipping costs. If a customer is not available to receive goods or provide a signature when a delivery agent arrives at his or her doorstep, the delivery agent may need to return one or more additional times to reattempt delivery. Statistics show that a high percentage of goods on delivery trucks are goods that were not successfully delivered on the initial try.
In view of the foregoing, what are needed are systems and methods to more efficiently deliver goods to recipients. In particular, systems and methods are needed to efficiently deliver goods to recipients even when recipients are unavailable to receive delivery. To facilitate such delivery, systems and methods are needed to efficiently administer access codes to enable delivery agents and other authorized users to access enclosures such as garages or reception boxes. Further needed are systems and methods to ensure that such access codes are administered in a safe and secure manner. Yet further needed are systems and methods to prevent unauthorized access to enclosures.
SUMMARY
The invention has been developed in response to the present state of the art and, in particular, in response to the problems and needs in the art that have not yet been fully solved by currently available systems and methods. Accordingly, systems and methods in accordance with the invention have been developed to more efficiently deliver goods to recipients, administer access codes to provide access to enclosures, and prevent unauthorized access to enclosures. The features and advantages of the invention will become more fully apparent from the following description and appended claims, or may be learned by practice of the invention as set forth hereinafter.
In a first embodiment of the invention, a method for more efficiently delivering goods to recipients is disclosed herein. Such a method includes obtaining a tracking number associated with an order of goods intended for delivery to a recipient. The method further includes obtaining an access code for association with the tracking number. The access code enables a delivery agent to gain access to an enclosure of the recipient for deposit of the goods therein. In certain embodiments, the access code is a temporary access code that expires once the delivery is fulfilled or the enclosure is accessed, thereby reducing the chance of unauthorized access to the enclosure. The method may also enable parameters (e.g., restrictions, constraints, conditions, etc.) regarding use of the access code to be established. A corresponding system is also disclosed.
In a second embodiment of the invention, a method for more efficiently delivering goods to recipients is disclosed. Such a method includes receiving a communication, such as an email or text message, containing a tracking number. The tracking number is associated with an order of goods intended for delivery to a recipient. The method extracts the tracking number from the communication and generates an access code for association with the tracking number. The access code enables a delivery agent to gain access to an enclosure of the recipient for deposit of the goods therein. In certain embodiments, the access code is derived from the tracking number, such as by using certain digits or portions of the tracking number to generate the access code. A corresponding system is also disclosed.
In a third embodiment of the invention, a method for detecting potentially unauthorized access to an enclosure is disclosed. Such a method includes detecting movement (e.g., opening and/or closing) of an access barrier of an enclosure. The method further detects whether a motor was used to move the access barrier. This may be accomplished, for example, by detecting electrical current drawn by the motor, vibration of the motor, voltage drop of electrical power supplied to the motor, rotation of the motor, or the like. In the event the access barrier was moved without using the motor, the method notifies a user, such as by sending an email or text message to the user. A corresponding system is also disclosed.
In a fourth embodiment of the invention, a method for more efficiently enabling access to an enclosure is disclosed. Such a method includes designating, on a computing device, an access code intended to enable access to an enclosure. The method further communicates, over a network, a first copy of the access code to a control mechanism configure to control access to the enclosure. A second copy of the access code is communicated to an end user device configured to directly communicate the second copy to the control mechanism. In certain embodiments, the end user device wirelessly communicates the second copy to the control mechanism using a short distance communication protocol. A corresponding system is also disclosed.
In a fifth embodiment of the invention, a method for more efficiently enabling access to an enclosure is disclosed. Such a method includes designating an access code intended to enable access to an enclosure and identifying an end user for whom the access code is intended. The method automatically generates a communication addressed to the end user. The communication informs the end user that the access code has been established. In certain embodiments, the communication further informs the end user of any parameters that have been established for the access code. The method sends the communication to the end user using, for example, an email address or phone number of the end user. The method further communicates the access code to a control mechanism configured to control access to the enclosure. A corresponding system is also disclosed.
In a sixth embodiment of the invention, a method for more efficiently delivering goods to recipients is disclosed. Such a method includes generating an access code configured to enable access to an enclosure. The method further monitors a status of a delivery of goods intended for deposit in the enclosure. This may be accomplished, for example, by monitoring a package tracking system used to monitor and track delivery of the goods. In response to detecting fulfillment of the delivery, the method automatically causes the access code to expire. A corresponding system is also disclosed.
Various of the apparatus embodiments as described herein may include a global positioning system (GPS) receiver, a near-field communications (NFC) transmitter, a wireless transceiver, one or more hardware processors, and hardware memory. The hardware memory may store instructions that, when executed by the one or more hardware processors: receives a current geographic location of the apparatus via the GPS receiver; determines a range between the location and a delivery address; as the range is less than or equal to 1000 feet, sends a request via the wireless transceiver to a cloud-based server for a hash digest associated with a remote input receptor that controls access to the enclosure, wherein the cloud-based server and the remote input receptor store a cryptographic hash function that generates the hash digest based on an acceptable input for the remote input receptor; receives the hash digest via the wireless transceiver from the cloud-based server; and transmits the hash digest via the NFC transmitter to the remote input receptor, wherein the remote input receptor applies the cryptographic hash function to the hash digest to unmask the acceptable input and allows access to the enclosure. The transceiver my comprise a broadband microstrip antenna as disclosed in co-pending U.S. patent application Ser. No. 15/458,347, entitled Broadband Microstrip Antenna, to Hall et al., which is incorporated herein in its entirety for all that teaches and claims.
A computer program product is also described herein for enabling more efficient and secure access to an enclosure over other prior art solutions. The product may include: computer code for receiving a current geographic location of a device on which the computer program product is stored; computer code for determining a range between the coordinates and a delivery address; computer code for sending a request to a cloud-based server, as the range is less than or equal to 1000 feet, for a hash digest associated with a remote input receptor that controls access to the enclosure, wherein the cloud-based server and the remote input receptor store a cryptographic hash function that generates the hash digest based on an acceptable input for the remote input receptor; computer code for receiving the hash digest from the cloud-based server; and computer code for transmitting the hash digest to the remote input receptor, wherein the remote input receptor applies the cryptographic hash function to the hash digest to unmask the acceptable input and actuates the remote input receptor upon unmasking the acceptable input.
A cloud-based server is also described herein that may enable more efficient and secure access to an enclosure. The server may include one or more hardware processors and hardware memory. The hardware memory may store a cryptographic hash function that generates, when processed by the processors in conjunction with an acceptable input, a hash digest based on the acceptable input for a remote input receptor that controls access to the enclosure. The hardware memory may also store instructions that, when executed by the one or more hardware processors: receives a request from a remote user device for the hash digest, wherein the remote user device indicates in the request proximity within a range less than or equal to 1000 feet between the remote user device and a delivery address of the enclosure; and transmits the hash digest to the remote user device, wherein the remote user device transmits the hash digest to the remote input receptor, and wherein the remote input receptor applies the cryptographic hash function to the hash digest to unmask the acceptable input and actuate the remote input receptor upon unmasking the acceptable input.
Various of the apparatus embodiments as described herein may include a wireless transmitter, a wireless transceiver, a global positioning system (GPS) receiver, a near-field communications (NFC) transmitter, one or more hardware processors, and hardware memory. The wireless transmitter may be disposed in a container having at least one side selectably transparent to radio frequency (RF) transmissions, the other sides of the enclosure opaque to RF transmissions. Each of the wireless transceiver, the GPS receiver and the NFC receiver may be disposed outside the container. The hardware memory may store instructions that, when executed by the one or more hardware processors: receives a current geographic location of the apparatus via the GPS receiver; determines a range between the location and a delivery address; as the range is less than or equal to 1000 feet, sends a request via the wireless transceiver to a cloud-based server for a hash digest associated with a remote input receptor that controls access to the enclosure, wherein the cloud-based server and the remote input receptor store a cryptographic hash function that generates the hash digest based on an acceptable input for the remote input receptor; receives the hash digest via the wireless transceiver from the cloud-based server; as the NFC receiver detects the apparatus is within a distance less than or equal to 8 inches, converts the selectably transparent side of the container from RF opaque to RF transparent; and transmits the hash digest via the wireless transmitter to the remote input receptor, wherein the remote input receptor applies the cryptographic hash function to the hash digest to unmask the acceptable input and allows access to the enclosure.
BRIEF DESCRIPTION OF THE DRAWINGS
In order that the advantages of the invention will be readily understood, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the invention and are not therefore to be considered limiting of its scope, the invention will be described and explained with additional specificity and detail through use of the accompanying drawings, in which:
FIG. 1 is a high-level view of a first embodiment of a delivery fulfillment system in accordance with the invention;
FIG. 2 is a high-level view of a second embodiment of a delivery fulfillment system in accordance with the invention;
FIG. 3 is a high-level view of a third embodiment of a delivery fulfillment system in accordance with the invention;
FIG. 4 is a high-level view of a fourth embodiment of a delivery fulfillment system in accordance with the invention;
FIG. 5 is a high-level view of a fifth embodiment of a delivery fulfillment system in accordance with the invention;
FIG. 6 is a perspective view of one embodiment of an enclosure, in this example a garage, using a programmable access mechanism to control access thereto;
FIG. 7 shows one embodiment of an input device for receiving an access code;
FIGS. 8A-C show various modules that may be incorporated into a server, control mechanism, and customer device in accordance with the invention;
FIGS. 9A-H show various exemplary pages of an application for administering access codes;
FIG. 10 shows one embodiment of a system for detecting potentially unauthorized access to an enclosure;
FIG. 11 shows one embodiment of a method for detecting potentially unauthorized access to an enclosure;
FIG. 12 depicts a method executable by a computer storing a computer program product having computer code for the depicted method steps;
FIG. 13 depicts additional method steps executable by a computer storing a computer program product having computer code for the depicted method steps;
FIG. 14 depicts a system diagram of an apparatus that enables secure and efficient access to an enclosure, as described herein;
FIG. 15 depicts a system diagram of a cloud-based server that enables secure and efficient access to an enclosure, as described herein;
FIG. 16 shows one embodiment of a system implementing an apparatus that enables secure and efficient access to an enclosure as described herein;
FIGS. 17A-B depict one embodiment of an apparatus for enabling secure and efficient access to an enclosure;
FIG. 18 depicts an isometric view of an electrical interface and solenoid for securely communicating data;
FIGS. 19A-C depict three views of an apparatus including a container having a selectably RF transparent side; and
FIG. 20 depicts an embodiment of a selectably RF transparent side.
DETAILED DESCRIPTION
It will be readily understood that the components of the present invention, as generally described and illustrated in the FIGs. herein, could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of the embodiments of the invention, as represented in the FIGs., is not intended to limit the scope of the invention, as claimed, but is merely representative of certain examples of presently contemplated embodiments in accordance with the invention. The presently described embodiments will be best understood by reference to the drawings, wherein like parts are designated by like numerals throughout.
The present invention may be embodied as a system, method, and/or computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
The computer readable storage medium may be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. Computer program code for implementing the invention may also be written in a low-level programming language such as assembly language.
In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, may be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general-purpose computer, special purpose computer, embedded system, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
Referring toFIG. 1, a high-level view of one embodiment of adelivery fulfillment system100 in accordance with the invention is illustrated. Such adelivery fulfillment system100 may be helpful in reducing inefficiencies associated with delivering goods over the “last mile,” as previously discussed. As shown, in the illustrated embodiment, acustomer102 may initially place an order for goods with amerchant104, such as anonline merchant104. In certain embodiments, when generating an order, themerchant104 may gather information about the customer102 (i.e., recipient102), such as name, address, payment information, and the like. Alternately, themerchant104 may receive authentication information from thecustomer102 that enables themerchant104 to retrieve previously stored information about thecustomer102. Once customer information is received and an order is completed, themerchant104 may decide to fulfill the order as a single shipment or divide the order into multiple shipments depending on the logistics for fulfilling the order. For each shipment, themerchant104 may obtain a tracking number. In certain embodiments, such a tracking number may be requested from ashipper106 tasked with delivering goods associated with the order. This tracking number may enable a shipment to be monitored and tracked as it moves from themerchant104 to thecustomer102.
In order to reduce inefficiencies associated with last-mile delivery, it may be advantageous to enable delivery agents to deliver goods in a safe and secure manner regardless of whether a customer is present when a delivery agent arrives. For example, if a delivery agent arrives at a customer's doorstep to deliver a package only to find that the customer is not present, the delivery agent may need to return the next day or leave the package at the customer's doorstep. In some cases, leaving the package at the customer's doorstep is not an option. For example, some goods may be sufficiently fragile, expensive, or sensitive that amerchant104 may require verification (e.g., a signature, etc.) that goods have been received by acustomer102.
On the other hand, a merchant may be more inclined to allow unattended delivery if goods could be left in a safe and secure location. For example, if goods could be left in an enclosure such as a garage, reception box, gated area, warehouse, or other secure enclosure, a merchant may be more inclined to allow unattended delivery of fragile, expensive, or sensitive items. On the other hand, customers may be reluctant to allow delivery agents to access secure enclosures such as garages when they are not present due to the potential for theft, compromises in personal security, or other reasons. Other issues, such as how and under what circumstances access would be granted to a delivery agent, may also need to be addressed before a customer feels comfortable allowing access to a secure enclosure. Thus, it would be an advance in the art to enable unattended delivery into secure enclosures while simultaneously addressing issues with respect to theft, personal security, and the like. One embodiment of such a system is illustrated inFIG. 1.
In certain embodiments in accordance with the invention, aserver108 may be established to provide a temporary access code to ashipper106 in exchange for a tracking number. For example, assuming acustomer102 has agreed to such an arrangement, upon generating or receiving a tracking number for a particular shipment, theshipper106 may provide the tracking number and customer information (such as a customer ID) to theserver108. Theserver108 may, in turn, return an access code to theshipper106 which is linked to the tracking number. In certain embodiments, adatabase112 coupled to theserver108 may store information such as customer information (such as a customer ID), each tracking number associated with the customer, the access code associated with each tracking number, parameters associated with each access code, and the like.
In addition to providing the access code to theshipper106, theserver108 may communicate with and program an access mechanism (e.g., a garage door opening mechanism) of a customer's enclosure110 (e.g., garage) with the access code. This may include establishing any parameters (e.g., constraints, limitations, etc.) associated with using the access code. Communication may occur over the Internet, a wide-area-network, a cell-phone-network, or other suitable network. When a delivery agent arrives at the delivery site (a customer's home, business, etc.), the delivery agent may gain access to the customer'senclosure110 using the access code, thereby allowing a package or other goods to be deposited therein. Theenclosure110 may then be secured (by closing an access barrier, or door, of the enclosure110). In certain cases, a shipper106 (or merchant104) may allow acustomer102 to establish certain customer preferences, such as allowing thecustomer102 to opt in to the aforementioned unattended delivery service.
Instead of generating an access code that provides indefinite access to anenclosure110, the access code may be temporary such that it will automatically expire at a specified time or in response to a specified event. For example, the access code may be a single-use access code that expires after a single use or a multiple-use access code that expires after a specified number of uses. In other embodiments, the access code automatically expires when a particular shipment is fulfilled. That is, when a particular shipment is designated as “delivered” or “fulfilled” in a package tracking system or other database, the access code may automatically expire. Thus, systems and methods in accordance with the invention may in certain embodiments be configured to monitor the status of a shipment of goods using a package tracking system or a database used to track a package's delivery status. The package tracking system could be a proprietary system or one generally available, such as over the Internet.
In yet other embodiments, an access code may be configured to expire after a specified amount of time (e.g., two weeks) has passed. Combinations of the above criteria or other criteria may also be used to determine when an access code expires. For example, an access code may be configured to expire after it is used a single time or after two weeks, whichever comes sooner. In another example, an access code may be configured to expire after a tracking number associated with the access code is designated as “fulfilled” or after two weeks, whichever comes sooner. In this way, access to anenclosure110 may be granted on a temporary basis as opposed to an indefinite basis, thereby preventing or reducing the chance that the access code will be used for unauthorized access to theenclosure110 as well as providing peace-of-mind for a customer.
Other parameters are also possible and within the scope of the invention. For example, an access window may be established for an access code such that the access code will only enable access to anenclosure110 between certain times of the day, on certain days of the week, or the like. In certain embodiments, an access window may be established around an estimated delivery date for a shipment. For example, an access window may be established two days before and after an estimated delivery date to provide ashipper106 some leeway when delivering a package. Other methods for determining a suitable access window are also possible and within the scope of the invention.
In certain embodiments, use of an access code may be configured to trigger various notifications. For example, when an access code is used to gain access to anenclosure110, a notification may be sent to acustomer102 associated with theenclosure110 indicating that the access code has been used. This may inform thecustomer102 that a particular package or shipment has arrived as well as alert thecustomer102 to any irregularities or possible unauthorized access. In certain embodiments, the amount of time anenclosure110 is open may be monitored to ensure that unauthorized activities are not occurring. For example, if a typical delivery takes one minute to open an enclosure, deposit a package, and close the enclosure, an alert may be sent if the enclosure is open for more than one minute. Notifications may also be sent anytime an access code is used to attempt to gain access to anenclosure110, even if access is not ultimately granted. In this way, an individual102 may continually monitor access or attempts to access anenclosure110.
In certain embodiments, data stored by theserver108 anddatabase112 may be specially configured to protect customer information. For example, a customer ID number (as opposed to a name and/or address) may be used to identify a customer in thedatabase112. This customer ID may be linked to specific tracking numbers and access codes, as well as a network address for communicating with an access mechanism (e.g., a garage door opening mechanism) of the customer. Thus, the names and/or addresses of customers may be omitted from thedatabase112. Thus, if a hacker were to overcome security measures to gain access to theserver108 and/ordatabase112, the hacker would be unable to acquire substantial sensitive information about the customer, or have difficulty linking information in thedatabase112 to the customer. In certain embodiments, a zip code may be stored for each customer ID in thedatabase112 to allow theserver108 to determine a time zone in which thecustomer102 resides. This may allow theserver108 to enforce access windows, expiration times, or other time- or date sensitive parameters associated with access codes.
In certain cases, themerchant104 andshipper106 illustrated inFIG. 1 may be a single business entity, or commonly-ownedbusiness entities104,106. For example, amerchant104 may provide a shipping service that delivers goods directly tocustomers102. In such cases, themerchant104 andshipper106 illustrated inFIG. 1 may act as a single entity. It follows that communications between themerchant104 andshipper106 may be unneeded in such embodiments. In any event, the single entity (merchant104 andshipper106 combined) may communicate with theserver108 anddatabase112 in substantially the same way described above.
Referring toFIG. 2, a high-level view of another embodiment of adelivery fulfillment system100 in accordance with the invention is illustrated. This embodiment is similar to the embodiment illustrated inFIG. 1 except that amerchant104, instead of ashipper106, procures an access code from theserver108. Once an order is complete, themerchant104 may request a tracking number from theshipper106 or generate or obtain a tracking number on its own. Using the tracking number, themerchant104 may request an access code from theserver108. Once the access code is received, themerchant104 may provide the access code to theshipper106 for use with the tracking number. Theserver108, in turn, may communicate with and program an access mechanism (e.g., garage door opening mechanism) of the customer's enclosure110 (e.g., garage) with the access code. This may include designating any parameters associated with using the access code. The embodiment described inFIG. 2 may be more feasible in situations where themerchant104 may be working with multiple shipping companies, or may be shipping some goods itself while outsourcing the shipment of other goods to other companies. By procuring the access code itself, themerchant104 may decide how and to whom to distribute the access code.
Referring toFIG. 3, a high-level view of another embodiment of adelivery fulfillment system100 in accordance with the invention is illustrated. In this embodiment, an access code or authorization to generate an access code is procured from acustomer102 as opposed to being automatically generated by aserver108. For example, when acustomer102 completes an order, thecustomer102 may be queried if he or she would like to assign an access code to the order. If affirmative, thecustomer102 may provide an access code to themerchant104 for use with the order. Alternatively, an access code may be automatically generated on behalf of thecustomer102, such as by themerchant104. This access code may be provided to ashipper106 for use with a tracking number. The access code may also be provided to aserver108 which may in turn communicate with and program an access mechanism of the customer'senclosure110. Alternatively, the customer may program the access mechanism with the access code using an access-code-management application, as will be explained in more detail hereafter. Like the previous examples, the access code may expire at designated time or in response to a designated event (e.g., one or more uses of the access code). Use of the access code may also be limited by various parameters, as previously discussed.
Referring toFIG. 4, in certain cases, it may be advantageous to provide adelivery fulfillment system100 that bypasses one or more of amerchant104 andshipper106. Such adelivery fulfillment system100 may provide the features and benefits discussed above without requiring buy in from amerchant104 and/orshipper106. In certain embodiments, such asystem100 may rely oncommunications400 sent bymerchants104 in response to orders or purchases. For example,many merchants104 will send one or more confirmation emails or texts to acustomer102 indicating details of an order as well as a tracking number associated with the order. A copy ofsuch communications400 may be sent or forwarded to aserver108 in accordance with the invention. In certain embodiments, acustomer102 may add a server address (email address, text address, etc.) to a list of recipients that receive alerts or notifications when an order is placed or shipped. Theserver108 may in turn extract a tracking number from one or more of thecommunications400 and generate an access code associated with the tracking number. In certain embodiments, the access code is derived from the tracking number. For example, the access code may be the last n (e.g., three or four) digits of the tracking number. Theserver108 may in turn program an access mechanism of the customer'senclosure110 with the access code.
When a delivery agent arrives at the customer's location, the delivery agent may be instructed (by a note or other means) to deposit the shipment into the customer'senclosure110. The delivery agent may also be instructed on how to derive the access code from the tracking number. Alternatively, thecustomer102 may establish customer preferences with theshipping company106 that directs the delivery agent to use the last n digits of a tracking number (or derive the access code from the tracking number in some other way) to access the customer'senclosure110 for deposit of goods therein. Other methods for communicating an access code to a delivery agent, such as downloading an access code directly to a delivery agent's mobile or handheld device, are also possible and within the scope of the invention.
Referring toFIG. 5, in other embodiments, adelivery fulfillment system100 in accordance with the invention may be configured to receive and extract customer information and tracking numbers fromcommunications400 originating from ashipper106. For example,various shippers106 may allowcustomers102 to establish shipping preferences, such as when and where shipments are delivered, what types of alerts and notifications are generated, and the like. These preferences may be set to providecommunications400 to aserver108 in accordance with the invention. Alternatively, acustomer102 may forward or sendcommunications400 received from theshipper106 to theserver108. Theserver108 may in turn extract relevant information, such as customer identifiers and tracking numbers, from thecommunications400. These customer identifiers and tracking numbers may in turn be used to generate access codes, which may be used to program the access mechanisms ofcustomer enclosures110.
Referring toFIG. 6, as previously mentioned, adelivery fulfillment system100 in accordance with the invention may be configured to program an access mechanism of a customer'senclosure110.FIG. 6 shows one embodiment of anaccess mechanism600, in this example a garagedoor opening mechanism600, configured to control access to agarage110. In the illustrated embodiment, the garagedoor opening mechanism600 includes agarage door opener604 and acontrol mechanism606. In this example, thecontrol mechanism606 includes acontrol module606aand aninput device606b(such as akeypad606b). To open thegarage door602, a user may input an access code into theinput device606b. This access code may be transmitted to thecontrol module606awhere it may be compared to one or more stored access codes that have been programmed into thecontrol module606a. If the entered access code matches a stored access code and any parameters associated with the stored access code are satisfied, thecontrol module606amay cause thegarage door opener604 to open thegarage door602. On the other hand, if the entered access code does not match a stored access code or the entered access code matches a stored access code but does not comply with one or more parameters associated with the stored access code, thecontrol module606amay deny entry to thegarage110.
As shown, theserver108 may communicate with thecontrol module606aover anetwork610 such as the Internet. In certain embodiments, thecontrol module606ais configured with a wired or wireless adapter to enable communication with a router or other device (hub, gateway, access point, etc.) connected to the Internet. Communication may occur using a protocol or technology such as WIFI or other radio frequencies such as proprietary RF protocols. In other embodiments, thecontrol module606amay communicate with a home automation system and receive data and/or control signals from a home automation controller or through a home automation controller connected to the Internet. In such embodiments, a home automation protocol such as Zigbee® or Z-Wave® may be used. In certain embodiments, such communication protocols may be used not only to communicate with theserver108, but also to enable communication between theinput device606b,control module606a, and/or garagedoor opening mechanism600.
Theserver108 may program thecontrol module606awith access codes to enable access to thegarage110. Theserver108 may also have the ability to remove access codes that are programmed into thecontrol module606a. Access codes that are programmed into thecontrol mechanism606 may also be configured to automatically expire at designated times and/or in response to designated events without intervention by theserver108. Once programmed, thecontrol mechanism606 may be configured to compare entered access codes with stored access codes as well as enforce parameters associated with the stored access codes.
The control mechanism606 (including thecontrol module606aandinput device606b) illustrated inFIG. 6 is advantageous in that it may be easily retrofitted to existinggarage door openers604. Because existinggarage door openers604 may use different wireless communication protocols to enable remote control and communication, providing aninput device606bthat supports all or most wireless communication protocols may be costly and overly complex. By implementing thecontrol mechanism606 as aninput device606bandcontrol module606a, a single wireless communication protocol may be used between theinput device606bandcontrol module606a. Thecontrol module606a, which may be located on or proximate agarage door opener604 may actuate thegarage door opener604 in the same or similar way as a wired switch. Thus, implementing thecontrol mechanism606 as two components (acontrol module606aandinput device606b) may eliminate or reduce compatibility problems with various wireless communication protocols. Nevertheless, in other embodiments, theinput device606bmay be configured to communicate in the native wired or wireless communication protocol of existing garage door openers, such as in embodiments where thecontrol mechanism606 is implemented entirely within theinput device606b.
Implementing thecontrol mechanism606 as aseparate input device606bandcontrol module606amay also allow theinput device606bto operate in a very low power state when not being used. In some cases, a wired power source may not be readily available to theinput device606b, thereby making battery power necessary. Keeping theinput device606bin a very lower power state when not in use may substantially extend battery life. Thecontrol module606a, by contrast, due to its proximity to agarage door opener604 or its position within agarage110, may have more ready access to a wired power source (possibly the same power source as a garage door opener604), thereby making power consumption less of a concern.
In certain embodiments, theinput device606bis used primarily to receive access codes from users. These access codes may be transmitted to thecontrol module606awhere they may be compared to acceptable access codes to either permit or deny entry to theenclosure110. In such embodiments, much of the functionality and/or processing power of thecontrol mechanism606 may be incorporated into thecontrol module606aas opposed to theinput device606b. In other embodiments, however, sufficient processing power and/or functionality may incorporate into theinput device606bto allow access codes to be stored and compared at theinput device606b. For example, in certain embodiments, much or all the functionality of thecontrol module606amay be incorporated into theinput device606b. In certain embodiments, thecontrol module606amay be eliminated entirely by incorporating all functionality into theinput device606b.
In yet other embodiments, certain functionality associated with thecontrol module606amay be performed by theserver108. For example, access codes entered at theinput device606bmay be transmitted to theserver108 where they may be compared to one or more access codes stored in thedatabase112. If the access codes match and any parameters with the access codes are satisfied, theserver108 may remotely control (e.g., open, close) thegarage door602. Centralized control at theserver108 may provide various benefits (centralized management of hardware, software, customer data, etc.) but also have drawbacks associated with centralized control. For example, centralized control may require a reliable network connection between theserver108 and garagedoor opening mechanism600. Interruptions or latency in the network may impair the ability of theserver108 to receive access codes from theinput device606bas well as remotely control the garagedoor opening mechanism600.
As shown inFIG. 6, in certain embodiments, anaccess mechanism600 in accordance with the invention may include one ormore sensors608. In certain embodiments, asensor608 may be configured to detect a position or movement of anaccess barrier602, such as agarage door602. This may allow theserver108,control module606a, or other components (such as a customer'smobile device612 or computing system612) to determine if thegarage door602 is open or closed at any given time. In certain embodiments, thesensor608 may also be configured to sense if theaccess barrier602 is transitioning from an open to a closed position, or vice versa, at any given time. Such asensor608 may enable components such as theserver108 andcontrol module606ato make decisions based on the current and intended position of theaccess barrier602. In certain embodiments, thesensor608 may also be used to determine whether anaccess barrier602 has been opened without authorization, such as in case of a break in, as will explained in more detail hereafter.
As further shown inFIG. 6, in certain embodiments, acustomer device612, such as amobile device612 orcomputing system612, may communicate with thecontrol mechanism606. In certain embodiments, an access-code-management application or other functionality on thecustomer device612 may allow access codes to be added to, modified, or removed from thecontrol module606a. In certain embodiments, thecustomer device612 may communicate directly with thecontrol module606a. In other embodiments, thecustomer device612 may communicate with acentralized server108, which may in turn communicate with thecontrol module606a.
The access-code-management application on thecustomer device612 may also include functionality to enable thecustomer102 to establish parameters for access codes programmed into thecontrol module606a. These parameters may include, for example, a number of times an access code may be used prior to expiration, an amount of time the access code is valid prior to expiration, days or times when the access code may be used, or the like. For example, acustomer102 may wish to program thecontrol mechanism606 with a temporary access code to enable a house cleaner or repairman to temporarily access the customer'senclosure110. Thecustomer102 may only wish to grant access during business hours on a specific day or days of the week. Thecustomer102 may also want the temporary access code to expire after a week even if it is never used. The access-code-management application may enable thecustomer102 to program thecontrol module606awith a temporary access code having one or more of the aforementioned parameters. The access-code-management application may also allow thecustomer102 to retire access codes that are no longer needed. Using the above-described functionality, acustomer102 may assign different access codes to different people and manage the access codes separately. This eliminates the need to share more permanent access codes (perhaps an access code used by thecustomer102 and/or family members) with persons who may only require access on a temporary basis or on specific days or times. The ability to perform such on amobile device612 orcomputing device612 also allows acustomer102 to manage the access codes using a more advanced interface as well as manage such remotely.
Referring toFIG. 7, one embodiment of aninput device606bin accordance with the invention is illustrated. As shown, theinput device606bis embodied as akeypad606b, although other types ofinput devices606bmay also be used. Where akeypad606bis used, a user may enter an access code by pressing one ormore keys704 in a particular sequence. As previously discussed, in certain embodiments, theinput device606bmay wake up upon receiving the access code. The access code may be forwarded to thecontrol module606apreviously described, where the access code may be compared to one or more acceptable access codes. Alternatively, theinput device606bmay receive the access code and compare the access code to one or more acceptable access codes at theinput device606b. If a match is found and any parameters associated with the matching access code are satisfied (e.g., the access code has not expired and/or the access code was entered during an acceptable access window), thecontrol module606amay actuate theaccess mechanism600, causing theaccess mechanism600 to open theaccess barrier602.
Other or additional methods for receiving access codes may also be incorporated into theinput device606b. For example, instead of manually inputting an access code, a user may wirelessly communicate an access code to theinput device606busing, for example, a mobile computing device (e.g., smart phone, etc.). In such an embodiment, the access code may be communicated to theinput device606busing a short distance communication protocol such as Near Field Communication (NFC) or Bluetooth™. To enable such communication, theinput device606bmay include areader700 incorporating NFC, Bluetooth™, or other wireless functionality. To wake up theinput device606b, the mobile computing device may, in certain embodiments, be tapped against theinput device606b. Theinput device606bmay, in turn, include an accelerometer, vibration, or other motion sensing device to sense contact from the mobile computing device and wake up other functionality of theinput device606b. In this way, theinput device606bmay be kept in a very low power state when not in use.
In other embodiments, theinput device606bmay include scanning functionality, such as an optical orRFID scanner702, to scan a tag or label storing the access code. The access code may be represented or stored in a bar code, matrix code, chip, integrated circuit, magnetic strip, or the like. The tag or label may, in certain embodiments, be physically attached to a package or other goods to be delivered into theenclosure110. One benefit of storing the access code in a mobile computing device, tag, or label, is that the access code may be more difficult to copy or transfer. It may also enable a delivery agent to access anenclosure110 without having actual knowledge of the access code. This, in turn, may provide greater security and reduce or prevent unauthorized use of the access code.
Referring toFIGS. 8A-C, the features and functions described above may be implemented in the form of one or more modules running on theserver108, control mechanism606 (which may include thecontrol module606aand/orinput device606b), andcustomer device612. These modules may be implemented in hardware, software, firmware, or a combination thereof. The modules, as well as their locations, are presented only by way of example and not limitation. Other modules are possible or the functionality of the modules may be organized differently in various embodiments. The modules are not necessarily tied to the locations where they are illustrated. For example, certain functionality shown in theserver108 may, in certain embodiments, be implemented in thecontrol mechanism606 orcustomer device612, or vice versa. Other functionality shown in a single location may, in certain embodiments, be distributed across multiple locations, such as across theserver108 andcontrol mechanism606. Thus, the illustrated modules and their locations are presented only by way of example and not limitation.
As shown inFIGS. 8A and 8B, in certain embodiments, aserver108 in accordance with the invention may include one or more of acustomer identification module800, a trackingnumber identification module802, an accesscode generation module804, aparameters module806, anassociation module808, acommunication module810, andother modules812. The control mechanism606 (including thecontrol module606aand/orinput device606b), on the other hand, may include one or more of averification module814, anactuation module816, aparameter enforcement module818, anotification module820, acommunication module821, andother modules822.
Acustomer identification module800 may identify acustomer102 associated with a selected tracking number. In certain embodiments, thecustomer102 is identified by a unique customer ID. The customer ID may allow a tracking number to be associated with a customer as well as allow an access code associated with the tracking number to be programmed into anaccess mechanism600 of the customer. Thus, the customer ID may, in certain embodiments, have a network address associated therewith, where the network address enables communication with anaccess mechanism600 of the customer'senclosure110. In certain embodiments, the customer ID is an esoteric ID that would prevent a hacker or intruder from specifically identifying acustomer102 associated with the customer ID.
A trackingnumber identification module802 may identify a tracking number associated with thecustomer102. In certain embodiments, this tracking number is received directly from amerchant104 orshipper106. In other embodiments, the tracking number is extracted from acommunication400, such as an email or text, directed to acustomer102 of themerchant104 orshipper106. Once a tracking number is identified, an accesscode generation module804 may generate an access code associated with the tracking number. In certain embodiments, the accesscode generation module804 derives the access code from the tracking number, such as by using selected digits (e.g., the last three or four digits) of the tracking number. In other embodiments, the accesscode generation module804 randomly generates the access code or generates the access code using an algorithm unrelated to the tracking number. Alternatively, or additionally, the accesscode generation module804 may enable a user to designate the access code.
Aparameters module806 may enable various parameters to be established for an access code. For example, theparameters module806 may designate a date and/or time the access code will expire. Alternatively, or in addition, theparameters module806 may designate an event or events that may cause the access code to expire. For example, the access code may expire after a single use, a designated number of uses, in response to an event such as marking a delivery as “completed” or “fulfilled”, or in response to user action such as manually causing the access code to expire. Theparameters module806 may also designate when an access code is valid. For example, an access code may only allow access to anenclosure110 on certain days (e.g., weekdays, weekends, Mondays, etc.), or at certain times (e.g., business hours, afternoons, mornings, etc.) of the day.
Anassociation module808 may associate an access code with a tracking number, such as by linking the two in thedatabase112 previously discussed. Acommunication module810 may be configured to communicate an access code to anaccess mechanism600 of a customer'senclosure110, along with any parameters associated with the access code. In certain embodiments, thecommunication module810 may transmit the access code to theaccess mechanism600 over the Internet or other suitable network.Other modules812 providing other desired functionality may also be provided by theserver108, as needed.
At the control mechanism606 (which may include thecontrol module606aand/orinput device606b), averification module814 may receive an access code entered at theinput device606band compare the access code to one or more acceptable access codes. If a match occurs and any parameters associated with the matching access code are satisfied (e.g., the matching access code has not expired, the access code was entered within a specified access window, etc.), anactuation module816 may actuate theaccess mechanism600 of the customer'senclosure110. Aparameter enforcement module818 may ensure that any parameters (e.g.,expiration824, permitted number of uses826,access window828, or other parameters830) associated with an access code are enforced.
Anotification module820 may provide notifications (e.g., emails, text messages, audio messages, etc.) to acustomer102. For example, in some embodiments, thenotification module820 may notify thecustomer102 anytime theaccess barrier602 is opened and/or closed regardless of whether an access code was used to open or close the access barrier. Thenotification module820 may also notify the user what access codes, if any, were used to access theenclosure110. In other embodiments, thenotification module820 may notify a user whenever an access code (either correct or incorrect) is entered into theinput device606b. In yet other embodiments, thenotification module820 may notify a user when new access codes have been programmed into or removed from the system. In other embodiments, thenotification module820 may report a current status of theaccess barrier602, such as whether the access barrier is open, closed, or moving. In yet other embodiments, thenotification module820 may notify a user if anenclosure110 is opened without actuating the access mechanism600 (such a scenario may occur where agarage door602 is opened without use of agarage door opener604, as may occur with a break in), as will be explained in more detail hereafter. Other notifications are possible and within the scope of the invention. Notifications may keep a user informed of the status of theenclosure110 as well as the current state or changes to the current state of the system. Using this information, a user may determine if and when a package or other goods has been delivered into theenclosure110, or if and when someone has accessed or attempted to access theenclosure110, with or without authorization.
Referring toFIG. 8C, in certain embodiments, a customer device612 (e.g., amobile device612 or other computing device612) may host an access-code-management application838 to administer access codes associated with thecontrol mechanism606. This access-code-management application838 may include one or more of anadd module840, aparameters module842, a modifymodule844, aremove module846, a status module848, aview module850, anotification module852, acommunication module854, andother modules856.
An addmodule840 may enable acustomer102 to add access codes, as needed, to thecontrol mechanism606. These access codes may be permanent (until removed or altered by the customer102) or temporary (automatically expiring at a specified time or in response to one or more events). Aparameters module842 may enable thecustomer102 to establish parameters for the access codes, such as times or events that will cause the access codes to expire, access windows or restrictions when the access codes may be used, or the like. A modifymodule844 may enable thecustomer102 to modify an existing access code, such as by modifying the access code itself, or modifying parameters associated with the access code. Aremove module846, by contrast, may enable thecustomer102 to remove access codes from thecontrol mechanism606 when they are no longer needed or desired.
A status module848 may enable a user to see the status of various components of theaccess mechanism600 andcontrol mechanism606. For example, the status module848 may enable a user to see the current status of the access barrier602 (e.g., garage door602), such as whether theaccess barrier602 is currently open, closed, or moving. In other or the same embodiments, the status module848 may enable thecustomer102 to see if acontrol mechanism606aand/orinput device606bare up and running correctly, or if a communication link (Internet access, etc.) is active between thecontrol module606aand aserver108 orcustomer device612. The status module848 may also enable a customer to see current battery charge levels (of theinput device606band/orcontrol mechanism606a) or current software or firmware versions that are being used. The status module848 may keep thecustomer102 informed of and/or enable thecustomer102 to determine the current state of the system.
In certain embodiments, aview module850 may enable acustomer102 to view information regarding the current system configuration or system use. For example, theview module850 may enable a user to see all currently valid access codes, as well as parameter information associated with the access codes. Where the access codes are associated with tracking numbers, theview module850 may also in certain embodiments enable the user to see the tracking numbers associated with the access codes. Theview module850 may also in certain embodiments enable a user to view historical information about the system. For example, theview module850 may enable a user to view current and expired access codes utilized over a period of time, as well as historical use information associated with the access codes. For example, a user may view when particular access codes were used to access or to attempt to access anenclosure110. These represent just a few exemplary types of information that may be displayed by theview module850.
Anotification module852 may be used to provide notifications in response to certain system changes or events. For example, if a new access code is generated and programmed into thecontrol module606a, thenotification module852 may send a notification to an individual or entity intended to use the access code. For example, if a user generates a temporary access code to enable a repairman to access anenclosure110, thenotification module852 may send a communication (e.g., an email or text message) to the repairman, notifying him or her that an access code has been generated to enable access to theenclosure110. The notification may also contain the access code or provide information regarding how to retrieve or determine the access code. The communication may, in certain embodiments, also communicate any parameters associated with the access code, such as when the access code is valid or will expire, or when the access code may be used.
Acommunication module854 may enable thecustomer device612 to communicate with thecontrol module606aand/orserver108. For example, thecommunication module854 may enable thecustomer device612 to pull a current list of active access codes (and associated tracking numbers) from thecontrol module606aand/orserver108 for viewing. Thecommunication module854 may also enable thecustomer device612 to communicate with and reconfigure thecontrol module606awith desired access codes.Other modules856 providing additional features and functions may also be provided in thecustomer device612.
Referring toFIGS. 9A through 9E, various exemplary pages900 of an access-code-management application838, configured to operate on acustomer device612, are illustrated. Such pages900 may provide a graphical user interface (GUI) for many of the modules discussed in association withFIG. 8C.
FIG. 9A shows one embodiment of ahome page900aorwelcome screen900a. As shown, thehome page900amay provide various types ofinformation904 andoptions902 to a user. In the illustrated embodiment, thehome page900ashows astatus904 of agarage door602, in particular indicating whether thegarage door602 is currently opened or closed. Thehome page900aalso provides a uservarious options902, such as view or modify the user's access codes, view activity with respect to theaccess mechanism600 and/or access codes, view settings of theaccess mechanism600 and/orcontrol mechanism606, or the like.
For example, referring toFIG. 9B, by selecting the “access codes”option902, the user may be presented with apage900blisting currently active access codes. In the illustrated embodiment, each access code is associated with a user identifier. This user identifier may be a word or phrase that enables the user to remember a purpose of the access code and/or who the access code is assigned to. In the illustrated example, the user identifier includes names such as “dry cleaner,shipping company 1,” “kids,” and “shipping company 2.” Alternatively, or additionally, a term such as “shirts” or “Amazon” may be used to identify goods or a merchant associated with an access code. As further shown inFIG. 9B, anoption906 may be presented to the user to add a new access code. A page enabling the user to add an access code is illustrated inFIG. 9C. Options may also be provided to modify or remove an existing access code. For example, a user may select an existing access code in thelist908 and be presented with options to either modify or remove the access code.
In certain embodiments (not shown), thepage900billustrated inFIG. 9B may optionally show access codes that have expired or been removed. This may allow a user to have a historical view of access codes that have been used over a period of time, including access codes that are no longer in use.
FIG. 9C shows one embodiment of apage900cfor adding an access code. As shown, thepage900cenables a user to designate auser identifier910 and associatedaccess code912. In certain embodiments, the access code is randomly generated or is generated using an algorithm, such as a sequential and/or rotating algorithm. A sequential algorithm may generate access codes in a specified sequence whereas a rotating algorithm may enable eventual reuse of access codes (a repeating sequence, for example). In other embodiments, the user may designate the access code. As further shown inFIG. 9C, thepage900cmay also enablevarious parameters914 to be established for theaccess code912. For example, the user may designate days of the week and/or times of the day when the access code is valid. In other embodiments, the user may establish when the access code expires, or what events (e.g., number of uses, etc.) may cause the access code to expire.
In certain embodiments, an option916 may be provided to share the access code with an end user. For example, if an access code is generated on behalf of a repairman, an option916 may be provided to share a copy of the access code with the repairman. In the illustrated embodiment, thepage900cenables a user to designate contact information, such as an email address or cellular phone number, so that a communication (e.g., email or test message) can be sent to the end user intended to utilize the access code. The communication may contain theaccess code912 or instructions for retrieving theaccess code912. Alternatively, or additionally, the communication may enable theaccess code912 to be uploaded to an end user computing device, such as a mobile computing device. This may allow the end user to directly communicate the access code to theinput device606busing the computing device. In certain embodiments, the communication may also specify anyparameters914 associated with theaccess code912, thereby informing the end user when or under what conditions the access code may be used.
FIG. 9D shows one embodiment of apage900dfor modifying anaccess code912. As shown, thepage900dmay enable a user to modify auser identifier910 associated with anaccess code912, theaccess code912 itself, orparameters914 associated with the access code. Thepage900dmay also allow the user to share the modifiedaccess code912 and any modified parameters with an end user intended to use theaccess code912.
FIG. 9E shows one embodiment of apage900edisplaying activity associated with anaccess mechanism600 and/or access codes. In the illustrated embodiment, the user is presented with a table918 that shows a user identifier, what actions were performed in association with the user identifier (e.g., whether anaccess barrier602 was opened or closed), as well as a time and date the actions were performed. In certain embodiments, the activity is shown over a specified period of time, which may in certain embodiments be user configurable.
In certain embodiments, filters may be applied to data displayed on thepage900e. For example, anoption920 may be provided to “show all activity.” Selecting thisoption920 may display an expandedset922 of data, as shown inFIG. 9F. This expanded set922 of data may include, for example, operations or attempts to operate anaccess mechanism600 that did not involve an access code, or unsuccessful attempts to open or close theaccess mechanism600 using an incorrect access code. For example, as shown inFIG. 9F, apage900fproviding an expandedset922 of data displays when a conventional remote control was used to operate theaccess mechanism600 as well as an attempt to operate theaccess mechanism600 using an invalid access code. In certain embodiments, the particular remote control that was used to operate theaccess mechanism600 may be identified (e.g., “mom's remote,” “kid's remote,” etc.). Other activity that may be monitored may include opening or closing theaccess barrier602 using an interior wall switch, or cases where anaccess barrier602 was opened or closed without using the access mechanism600 (such as in cases where theaccess barrier602 is physically detached from theaccess mechanism600 and operated manually).
FIG. 9G shows one embodiment of apage900gdisplaying various system status or settings. In the illustrated embodiment, thepage900gdisplays a current status924 of an access barrier602 (i.e., whether theaccess barrier602 is opened or closed) as well as thestatus926,928 of various hardware devices, specifically the current battery charge level of aninput device606band/orcontrol module606a. Other status information, such as whether aninput device606b,control module606a, orvarious sensors608 are up and running correctly, or an Internet or other network connection is operating correctly, may also be displayed.
Variations of the pages900a-gillustrated inFIGS. 9A through 9G are possible and within the scope of the invention. For example, referring toFIG. 9H, where an access-code-management application838 is used in association with adelivery fulfillment system100, as illustrated inFIGS. 1 through 5, apage900hmay be provided that links access codes to specific tracking numbers. Among other benefits, this feature may enable a user to track which access codes are associated with tracking numbers as well as determine if and when a particular package or goods has been delivered to anenclosure110.
Referring toFIG. 10, as previously mentioned, in certain embodiments a user may be notified if anenclosure110 is opened without actuating theaccess mechanism600. Such a scenario may occur, for example, where agarage door602 is opened without using agarage door opener604. For example, a garagedoor opening mechanism600 may include alatch1004 orlever1004 that allows agarage door602 to temporarily disconnect from the garagedoor opening mechanism600, thereby allowing thegarage door602 to be opened or closed manually without assistance from the garagedoor opening mechanism600. This feature may enable a user to open or close agarage door602 in the event of a power outage or failure of the garagedoor opening mechanism600. Unfortunately, this feature may also enable unauthorized persons to break intogarages110 orother enclosures110. For example, it has been well documented that a coat hanger or other wire may be inserted between agarage door602 and the garage wall from the exterior of thegarage110 to manipulate thelatch1004 orlever1004. This may disconnect thegarage door602 from the garagedoor opening mechanism600 to enable unauthorized access to thegarage110.
In order to detect potentially unauthorized access to anenclosure110 such as agarage110, acontrol module606aor other device in accordance with the invention may be configured to identify situations where thegarage door602 is opened without assistance from a garagedoor opening mechanism600. In such situations, thegarage door602 may move while the motor and other connected parts of the garagedoor opening mechanism600 may (1) remain substantially stationary or (2) move while not providing the motive force needed to move thegarage door602. Thus, detecting potential unauthorized access may be accomplished by detecting movement of thegarage door602 with a concurrent lack of movement or energization of the motor.
To accomplish this, one ormore sensors608 may be provided to detect movement of anaccess barrier602 of theenclosure110. For example, variousmagnetic sensors608 currently on the market may be used to detect when the access barrier is opened or closed. Infra-red sensors608,light sensors608, or othersuitable sensors608 may also be used to detect movement of theaccess barrier602.
Similarly, one ormore sensors1000 may be used to detect operation of agarage door opener604, particularly a motor of thegarage door opener604. For example, acurrent sensor1000ainternal or external to thecontrol module606amay be used to detect whether the motor is energized by detecting electrical current drawn by the motor. If no current is drawn when agarage door602 is opened, it may be concluded that thegarage door opener604 was not used to open thegarage door602. Alternatively, avibration sensor1000bmay be used to detect vibration of the motor. Little or no vibration may indicate that agarage door opener604 was not used to open agarage door602. Other types of sensors may be used to detect operation of the motor in different embodiments. For example, avoltage sensor1000 may detect a voltage drop of electrical power supplied to the motor, which occurs when the motor is energized. Alternatively, amovement sensor1000 such as a rotational sensor may be used to detect rotation of the motor or movement of other parts (e.g., drive mechanism, chain, belt, etc.) connected to the motor.
In addition to detecting potentially unauthorized access, thesensors608,1000 may be used to detect other conditions which may warrant attention. For example, thesensors608,1000 may be used to detect scenarios where anaccess mechanism600 was actuated but anaccess barrier602 such as agarage door602 did not open or close as intended, as may occur with a broken drive mechanism. This may allow the system to perform the operation again, perform diagnostics to determine the cause of the problem, and/or alert a user of the problem. Other sensors may also be incorporated into thecontrol module606a. For example, a camera (still or video) or motion sensor may be incorporated into or connected to thecontrol module606ato monitor activity that occurs whenever anaccess barrier602 is opened and/or closed. For example, a camera feed could be recorded or monitored remotely anytime agarage door602 is opened or closed to ensure that access codes are being used for authorized activities.
Referring toFIG. 11, one embodiment of amethod1100 for detecting potentially unauthorized access to anenclosure110 is illustrated. Such amethod1100 may, in certain embodiments, be implemented in thecontrol module606apreviously discussed. As shown, themethod1100 may initially determine1102 whether an access barrier602 (e.g., a garage door602) has moved or is moving. This may be accomplished using the one ormore sensors608 previously discussed. If theaccess barrier602 has moved or is moving, themethod1100 may determine1104 whether a motor of an access mechanism600 (e.g., a garage door opening mechanism600) was used to move theaccess barrier602. If the motor was not used to move theaccess barrier602, themethod1100 may notify1106 a user, such as by sending an email or text message to the user. Notifying1106 the user may include notifying the user of potential unauthorized access to theenclosure110.
Although particular reference has been made herein toenclosures110 such asgarages110, the systems and methods disclosed herein may be equally applicable to other types ofenclosures110, such as reception boxes, living quarters, gated areas, warehouses, sheds, and the like.Such enclosures110 may be substantially enclosed or enclosed around a perimeter thereof, as in a gated area. Thus, the term “enclosure’, should be broadly interpreted to include all types of enclosures, whether fully enclosed or not. Similarly, the term “access mechanism,” although described with particular reference herein to garagedoor opening mechanisms600, may include a wide variety ofdifferent access mechanisms600, including door locks, automatic door openers, gate locks, automatic gate openers, and the like. Nothing in this disclosure should be interpreted to indicate that the disclosed systems and methods are only applicable to garagedoor opening mechanisms600.
Similarly, the phrase “tracking number” has been used primarily herein to describe unique identifiers issued by freight or shipping companies for packages or other deliveries of goods. However, in other embodiments a “tracking number” may include unique identifiers such as sales order numbers, product identifiers, or other unique identifiers that are used to identify or track orders of goods, shipments of goods, or particular products or items. Thus, the phrase “tracking number” is intended to be used broadly in the foregoing description and claims to encompass any type of unique identifier associated with a product or an order or shipment of goods.
The flowchart and block diagrams in the FIGs. illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the FIGs. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
FIG. 12 depicts a method executable by a computer storing a computer program product having computer code for the depicted method steps. The method, when performed by one or more computer processors, may enable access to an enclosure. The method includes, atblock1201, initiating the program. The program may, for example, be embodied as an application installed on a smartphone, tablet, personal computer, and/or other personal computing device. Atblock1202, the method includes receiving a current geographic location of a device (e.g. the smartphone, tablet, personal computer, and/or personal computing device) on which the computer program product is stored. Atblock1203, the method includes determining a range between the location of the device and a delivery address. Atblock1204, a decision is made based on whether the range is less than or equal to 1000 feet. If so, themethod1200 proceeds to block1205. If not, themethod1200 reverts to block1202. Atblock1205, a request is send from the device to a cloud-based server for a hash digest associated with a remote input receptor that controls access to the enclosure. The cloud-based server and the remote input receptor store a cryptographic hash function that generates the hash digest based on an acceptable input for the remote input receptor as described herein. Atblock1206, a decision is made based on whether the hash is received. If so, themethod1200 proceeds to block1207. If not, the method reverts to block1202. Alternatively, themethod1200 may revert to block1205. Atblock1207, the hash digest is transmitted to the remote input receptor. The remote input receptor may apply the cryptographic hash function to the hash digest to unmask the acceptable input. The remote input receptor may actuate to permit access to the enclosure. Atblock1208, the process is terminated.
Themethod1200 provides many benefits immediately recognized by those of skill in the art. For example, themethod1200 allows for establishment of a unique acceptable input (e.g. a PIN number) for a remote input receptor without ever revealing the actual input and by only providing the hashed input to a user when the need for the input is immediate. Additional embodiments of themethod1200 may include transmitting with the request an authorization code that corresponds to a particular device, a particular user, or both. This further improves the security of providing for unattended access to an enclosure.
In some embodiments of themethod1200, a status of an access-governing parameter may be sent with the request for the hash digest. The hash digest may only be generated if the access-governing parameter correctly corresponds to a hash digest generation parameter stored on the cloud-based server. The parameters may comprise a current access number of a total number of permitted access events. For example, a particular acceptable input may be authorized for 5 uses (for example, a neighbor who has offered to feed the cat while the owner is out of town for 5 days). The hash digest generation parameter may be 5, and the access-governing parameter may be any of 1, 2, 3, 4 or 5. The cloud-based server may include an if-then statement asking whether the access-governing parameter is less than or equal to the hash digest generation parameter. If the statement is true, the hash digest is generated. Additionally, an update to the access-governing parameter may be returned to the device with the hash digest. In various other embodiments, the parameters may include one or more of a time, a day of the week, a date, a time range, a day of the week range, and a date range.
The cloud-based server may be a remotely-located server (i.e. at a different geographic address/location than the enclosure and/or device) that is either dedicated or shared. The server may be shared with other users of the enclosure access enablement system as described herein, and may dedicated solely for use by users of the enclosure access enablement system as described herein. Alternatively, the server may be dedicated to a particular user. The server may be connected to a network via WiFi, Ethernet, and/or other equivalents.
The device on which the computer program product is stored and by which it is run may be mobile, and thus may have a changing location relative to the delivery address. The location may be continuously or intermittently updated until the device is within the range. The location may select the delivery address based on an expected and pre-programmed order of delivery. Alternatively, a user of the device may manually initiate the location-checking and range calculation.
The maximum range required before the hash digest request is sent may be 1000 feet, from 100 feet to 900 feet, from 200 feet to 800 feet, from 300 feet to 700 feet, from 400 feet to 600 feet, from 450 feet to 550 feet, or less than or equal to 250 feet. A preferred range may be 500 feet, which will provide, on average, enough time between arrival at the access barrier and remote input receptor and sending of the request for the hash digest to be generated and transmitted to the user device. The range may be calculated from the location of the device to the delivery address based on a GPS coordinate or set of coordinates of each of the enclosure and the user device.
The delivery address may be associated with the enclosure and may direct the user to the proper location for the enclosure based on an addressing scheme for the locale of the enclosure. The delivery address may be associated with a set of GPS coordinates for comparison with the device location.
The cloud-based server and the remote input receptor may each store the acceptable inputs that, when provided by a user, may allow user access to the enclosure by permitting and causing the remote input receptor to actuate. The server and remote input receptor may also each store the same cryptographic hash function, such that the hash digest may be generated based on a particular acceptable input and deconstructed into the same acceptable input.
FIG. 13 depicts additional method steps executable by a computer storing a computer program product having computer code for the depicted method steps. Themethod1300 includes, atblock1301, initiating the program. Atblock1302, a communication designated for a user of the device is received. The communication informs the user the hash digest is generated. Atblock1303, the communication is converted into one or more of a visual and audio format in which the user may consume the communication by, for example, reading text informing the user the hash digest is generated and/or hearing words informing the user the hash digest is generated. The communication may include one or more of a text message, and email and a phone call.
FIG. 14 depicts a system diagram of an apparatus that enables secure and efficient access to an enclosure, as described herein. Theapparatus1400 includes a global positioning system (GPS)receiver1401, a near-field communications (NFC)transmitter1402, awireless transceiver1403, one ormore hardware processors1404, andhardware memory1405. The hardware memory stores anenclosure access application1406. Theenclosure access application1406 includes: alocation module1406a, arange module1406b, and a hash request andhandling module1406c. Each module may handle/perform one or more of the following tasks: receiving a current geographic location of theapparatus1400 via theGPS receiver1401; determining a range between the location and a delivery address; determining whether the range is less than or equal to a pre-determined distance, such as less than or equal to 1000 feet; as the range is less than or equal to the pre-determined distance, sending a request via the wireless transceiver to a cloud-based server for a hash digest associated with a remote input receptor that controls access to the enclosure, wherein the cloud-based server and the remote input receptor store a cryptographic hash function that generates the hash digest based on an acceptable input for the remote input receptor; receiving the hash digest via the wireless transceiver from the cloud-based server; and transmitting the hash digest via the NFC transmitter to the remote input receptor, wherein the remote input receptor applies the cryptographic hash function to the hash digest to unmask the acceptable input and actuates upon unmasking the acceptable input.
At least one of themodules1406a-cmay further handle/perform the task of receiving a communication designated for a user of the apparatus and converting the communication into one or more of a visual and audio format in which the user may consume the communication. The communication may inform the user the hash digest was generated. The communication may include one or more of a text message, an email, and a phone call.
At least one of themodules1406a-cmay further handle/perform the task pf sending with the request a status of an access-governing parameter (similar to that described above regardingFIG. 12). The hash digest is only generated if the access-governing parameter correctly corresponds to a hash digest generation parameter stored on the cloud-based server.
Theapparatus1400 may include one or more of a variety of personal computing devices such as a smartphone, a tablet, a personal computer, a virtual machine, and/or equivalents of such. The GPS receiver may receive location beacons from either a satellite or ground-based beacons. TheGPS receiver1401 may be integrated as a GPS transceiver that transmits a beacon to a satellite and/or one or more ground-based beacons. TheNFC transmitter1402 may be range-limited by the transmission strength of theNFC transmitter1402, and/or by the sensitivity of a NFC receiver integrated with the remote input receptor. The NFC transmitter-receiver pair may have a maximum range of up to 6 inches, up to 1 foot, up to 3 feet, up to 5 feet, up to 10 feet, up to 20 feet, or up to 50 feet.
Thewireless transceiver1403 may communicate using one or more of a variety of communications protocols, including 3G, 4G, LTE, Wifi, Bluetooth, Zigbee, Z-wave, LoRa, SureFi (a FHSS protocol on the 900 MHz ISM band), and/or equivalents. Theapparatus1400 may therefore communicate via thewireless transceiver1403 with the cloud-based server.
FIG. 15 depicts a system diagram of a cloud-based server that enables secure and efficient access to an enclosure, as described herein. The cloud-basedserver1500 includeshardware processors1501,communications hardware1502, andhardware memory1503. Thehardware memory1503 may store acryptographic hash function1504, one or moreacceptable inputs1505 associated with a remote input receptor that controls access to the enclosure, and anenclosure access application1506. Theapplication1506 may include ahash generation module1506aand a hashrequest handling module1506b. In some embodiments (not depicted), thememory1503 may also store a hash digest generation parameter.
Each of themodules1506a-bmay handle/perform one or more of the following tasks: receiving a request from a remote user device for the hash digest, wherein the remote user device indicates in the request proximity within a range less than or equal to 1000 feet between the remote user device and a delivery address of the enclosure; transmitting the hash digest to the remote user device, wherein the remote user device transmits the hash digest to the remote input receptor, and wherein the remote input receptor applies the cryptographic hash function to the hash digest to unmask the acceptable input and actuates upon unmasking the acceptable input; transmitting a communication designated for a user of the remote user device, wherein the communication informs the user the hash digest is generated; and receiving with the request a status of an access-governing parameter, wherein the hash digest is generated if the access-governing parameter correctly corresponds to the hash digest generation parameter. Additional modules besides those expressly disclosed may also be programmed in the application which may each handle/perform one or more of the preceding tasks. Such may also be true of the application described above regardingFIG. 14.
FIG. 16 shows one embodiment of a system implementing an apparatus that enables secure and efficient access to an enclosure as described herein. Thesystem1600 includes theenclosure1601 with anentry barrier1602 and aremote input receptor1603; a user device; and a cloud-basedserver1605. In the depicted embodiment, theenclosure1601 is a garage, theentry barrier1602 is a garage door, theremote input receptor1603 is a pin pad networked to a motor that actuates to open the garage door, and theuser device1604 is a smartphone with an application installed that performs the steps of: determining a GPS location of thedevice1604; comparing the location of thedevice1604 to a delivery address of theenclosure1601 to determine a range between the location and the delivery address; when the range is less than or equal to 1000 feet, requesting a hash digest from the cloud-basedserver1605 via awireless network1606; receiving the hash digest via thewireless network1606; and transmitting the hash digest to the remote input receptor viaNFC communication1607. Theremote input receptor1603 is referred to as such because it is positioned remotely from the server and the mechanism that actuates theentry barrier1602. However, it should be understood that theremote input receptor1603 may be similar to input devices described above with regard to other embodiments.
FIGS. 17A-B depict one embodiment of an apparatus for enabling secure and efficient access to an enclosure. Theapparatus1700 includes auser interface1701, an outer protective shell orcase1702, asolenoid1703, and anelectrical interface1704. In the depicted embodiment, theapparatus1700 is a smartphone and theelectrical interface1704 is a male USB connector. However, theapparatus1700 may be embodied as any of a variety of other devices, such as a tablet, a personal or enterprise digital assistant, or other equivalent portable computing device. Similarly, theelectrical interface1704 may be embodied as a male or female end of a variety of electrical data transmission connectors, including USB, mini USB, micro USB, FireWire, and/or other equivalents. Theelectrical interface1704 may be modified from its standard construction to accommodate connection to the solenoid.
As shown inFIG. 17A, thesolenoid1703 andelectrical interface1704 are disposed within theapparatus1700. As shown inFIG. 17B, thesolenoid1703 extends theelectrical interface1704 from theapparatus1700. Hardware memory integrated with theapparatus1700 may store instructions that, when executed by one or more hardware processors integrated with theapparatus1700, extend theelectrical interface1704 from theapparatus1700 by thesolenoid1703. Theelectrical interface1703 may transmit a hash digest requested and received by theapparatus1700 to a remote input receptor with a complementary electrical interface. In some embodiments, theapparatus1700 may include an NFC receiver, and the remote input receptor may include an NFC transmitter. The memory may store instructions that, when executed by the processors, causes thesolenoid1703 to extend theelectrical interface1704 from theapparatus1700 as the NFC receiver detects the remote input receptor is within a specified range, such as one foot, of the remote input receptor.
In general, the hardware memory of theapparatus1700 may store a computer program product as described herein. The computer program product may include computer code for extending theelectrical interface1704 from theapparatus1700 by thesolenoid1703 and computer code for transmitting the hash digest to the remote input receptor via theelectrical interface1704. The computer program product may further include computer code for detecting theapparatus1700 is within a distance (such as one foot) of the remote input receptor and computer code for extending theelectrical interface1704 from theapparatus1700 as the device is within the distance.
One benefit of theelectrical interface1704 andsolenoid1703 structure is security. Thesolenoid1703 may only extend theelectrical interface1704 from theapparatus1700 when a hash digest has been received AND theapparatus1700 is within a specified distance of the remote input receptor. This may prevent unauthorized use of the device and/or unauthorized sharing of hash information by preventing access to theelectrical interface1704. A lid may be placed over theelectrical interface1704 enclosing the interface within theapparatus1700. Wiring extending from theelectrical interface1704 may be bonded to one or more of thecase1702 or circuitry within theapparatus1700 such that attempts to break into theapparatus1700 cause breakage of the wiring, severing theelectrical interface1704 from the hardware memory of theapparatus1700.
FIG. 18 depicts an isometric view of anelectrical interface1801 andsolenoid1802 for securely communicating data.Wiring1803 connects theelectrical interface1801 to hardware processors and memory of the device in which theelectrical interface1801 andsolenoid1802 are disposed.
FIGS. 19A-C depict three views of an apparatus including an container having a selectably RF transparent side.FIG. 19A shows the apparatus in an RF opaque configuration.FIG. 19B shows the apparatus in an RF transparent configuration.FIG. 19C is an exploded view. Theapparatus1900 includes acontainer1901 having a selectably RFtransparent side1902 and RFopaque sides1903. Anantenna1904 andwireless transmitter1905 are disposed within thecontainer1901. As described above with regard to other embodiments, an NFC receiver may be incorporated into theapparatus1900 outside thecontainer1901. As the NFC receiver detects the apparatus is within proximity of the remote input receptor, the apparatus may convert the selectably RFtransparent side1902 from RF opaque to RF transparent. Such proximity may range from less than or equal to 8 inches, between 6 inches and 12 inches, and/or less than or equal to 24 inches. Thewireless transmitter1905 may then communicate information, via theantenna1904, to the remote input receptor. Thewireless transmitter1905 may be tuned to be low range, such that the strength of the signal emitted by theantenna1904 is less than or equal to negative 110 dBm at a distance greater than or equal to 12 inches from thetransmitter1905. The information communicated by thewireless transmitter1905 may be the hash digest. Theantenna1904 may be a broadband microstrip antenna as disclosed in co-pending U.S. patent application Ser. No. 15/458,347, to Hall et al., entitled Broadband Microstrip Antenna, which is incorporated herein in its entirety for that it claims and teaches.
In various embodiments, theapparatus1900 may also include an RF transparent pane disposed over the selectably RFtransparent side1902 of thecontainer1901. The pane may be visually transparent, visually opaque, may be tinted to reduce light transmission, or may at least partially obscure light transmission. The pane may be comprised of a plastic material or glass. This may provide protection to the components of the selectably RFtransparent side1902.
The selectably RF transparent side is described in more detail below. The RFopaque sides1903 of thecontainer1901 may comprise one or more electrically conductive materials, such as metal or other equivalents. Additionally, one or more of the RFopaque sides1903 of thecontainer1901 may include interconnects that connect the wireless transmitter to the hardware processors, hardware memory, or both, of theapparatus1900. The hardware processors, hardware memory, or both, may be disposed outside thecontainer1901.
FIG. 20 depicts an embodiment of a selectably RF transparent side shown in, and described above regarding,FIGS. 19A-C. The selectably RFtransparent side2000 includes amesh2001, afirst brace2002, asecond brace2003, athird brace2004, afourth brace2005, afirst worm gear2006, and asecond worm gear2007. Disposed in the first orsecond brace2002,2003 is a first motor that drives thefirst worm gear2006. Disposed in the third orfourth brace2004,2005 is a second motor that drives thesecond worm gear2007. The motors may be powered via electronics disposed within the container, our electronics outside the container. For example, the motors may be controlled by hardware processors disposed outside the container via interconnects through one or more of the RF opaque container sides.
As shown, themesh2001 is fixed at afirst side2001ato thefirst worm gear2006, and at asecond side2001bto thesecond worm gear2007. The first andsecond sides2001a,bare also depicted as being fixed tobraces2003,2005, which may contain the first and second motors. However, the first andsecond sides2001a,bmay be fixed to at least one of the RF opaque sides of the container.

Claims (20)

We claim:
1. An apparatus that enables access to an enclosure, the apparatus comprising:
a container having at least one side selectably transparent to radio frequency (RF) transmissions, the other sides of the container opaque to RF transmissions;
a wireless transmitter disposed within the container, and a wireless transceiver, a global positioning system (GPS) receiver, and a near-field communications (NFC) receiver each disposed outside the container;
one or more hardware processors and hardware memory storing instructions that, when executed by the one or more hardware processors:
receives a current geographic location of the apparatus via the GPS receiver;
determines a range between the location and a delivery address;
as the range is less than or equal to 1000 feet, sends a request to a cloud-based server via the second wireless transceiver for a hash digest associated with a remote input receptor that controls access to the enclosure, wherein the cloud-based server and the remote input receptor store a cryptographic hash function that generates the hash digest based on an acceptable input for the remote input receptor;
receives the hash digest via the wireless transceiver from the cloud-based server;
as the NFC receiver detects the apparatus is within a distance less than or equal to 8 inches, converts the selectably transparent side of the container to RF transparent; and
transmits the hash digest via the wireless transmitter to the remote input receptor, wherein the remote input receptor applies the cryptographic hash function to the hash digest to unmask the acceptable input and allow access to the enclosure.
2. The apparatus ofclaim 1, wherein the hardware memory further stores instructions that, when executed by the one or more hardware processors:
receives a communication designated for a user of the apparatus, wherein the communication informs the user the hash digest is generated; and
converts the communication into one or more of a visual and audio format in which the user may consume the communication.
3. The apparatus ofclaim 2, wherein the communication comprises one or more of a text message, an email, and a phone call.
4. The apparatus ofclaim 1, the hardware memory further storing instructions that, when executed by the one or more hardware processors:
sends with the request a status of an access-governing parameter, wherein the hash digest is generated if the access-governing parameter correctly corresponds to a hash digest generation parameter stored on the cloud-based server.
5. The apparatus ofclaim 4, wherein the parameters comprise a current access number of a total number of permitted access events.
6. The apparatus ofclaim 5, wherein the parameters comprise one or more of a time, a day of the week, and a date within a range of dates.
7. The apparatus ofclaim 1, wherein the selectably transparent side of the container comprises a mesh formed of electrically conductive material.
8. The apparatus ofclaim 7, wherein the mesh is fixed at a first side to a first worm gear driven by a first motor, and wherein the mesh is fixed at a second side to a second worm gear driven by a second motor.
9. The apparatus ofclaim 8, wherein the first and second sides are opposite sides of the mesh.
10. The apparatus ofclaim 8, wherein a third side of the mesh adjacent to the first side, the second side, or both, is fixed to at least one of the RF opaque sides of the container.
11. The apparatus ofclaim 8, wherein a third side of the mesh adjacent to the first side, the second side, or both, is fixed to the first motor, the second motor, or both.
12. The apparatus ofclaim 7, wherein the selectably transparent side of the container further comprises an RF transparent pane disposed over the mesh.
13. The apparatus ofclaim 12, wherein the pane is visually transparent.
14. The apparatus ofclaim 12, wherein the pane is visually opaque.
15. The apparatus ofclaim 12, wherein the pane comprises a plastic material.
16. The apparatus ofclaim 12, wherein the pane comprises a glass material.
17. The apparatus ofclaim 1, wherein the RF opaque sides of the container comprise one or more electrically conductive materials.
18. The apparatus ofclaim 17, wherein the RF opaque sides of the container comprise metal.
19. The apparatus ofclaim 17, wherein one or more of the RF opaque sides of the container comprise interconnects that connect the wireless transmitter to the hardware processors, hardware memory, or both, the hardware processors, hardware memory, or both, disposed outside the container.
20. The apparatus that enables access to an enclosure ofclaim 1, wherein the wireless transmitter and wireless transceiver are in communication with a broadband microstrip antenna disposed within the apparatus.
US15/662,6412014-11-042017-07-28Apparatus enabling secure wireless access to an enclosureActiveUS9811958B1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/662,641US9811958B1 (en)2014-11-042017-07-28Apparatus enabling secure wireless access to an enclosure

Applications Claiming Priority (6)

Application NumberPriority DateFiling DateTitle
US14/532,523US20150235173A1 (en)2014-02-182014-11-04Automated Tracking-Number Based Administration of Access Codes
US14/533,247US20150235174A1 (en)2014-02-182014-11-05Tracking-Number Extraction Facilitating Administration of Access Codes
US14/533,324US20150235490A1 (en)2014-02-182014-11-05Access Code Administration and Sharing
US14/533,268US20150235172A1 (en)2014-02-182014-11-05System and Method for Detecting Potentially Unauthorized Access to an Enclosure
US14/533,291US20150235493A1 (en)2014-02-182014-11-05System and Method for Communicating and Authenticating an Access Code
US15/662,641US9811958B1 (en)2014-11-042017-07-28Apparatus enabling secure wireless access to an enclosure

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/533,324Continuation-In-PartUS20150235490A1 (en)2014-02-182014-11-05Access Code Administration and Sharing

Publications (2)

Publication NumberPublication Date
US9811958B1true US9811958B1 (en)2017-11-07
US20170323502A1 US20170323502A1 (en)2017-11-09

Family

ID=60189803

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US15/662,641ActiveUS9811958B1 (en)2014-11-042017-07-28Apparatus enabling secure wireless access to an enclosure

Country Status (1)

CountryLink
US (1)US9811958B1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20180112454A1 (en)*2016-10-202018-04-26Tti (Macao Commercial Offshore) LimitedSystems and methods for controlling garage door opener operations
US20180178753A1 (en)*2015-07-082018-06-28Volkswagen AktiengesellschaftMethod, control apparatus and vehicle
CN108460872A (en)*2018-03-062018-08-28宁夏慧百通赢科技有限公司The control method and device of smart lock
US10985909B2 (en)*2007-09-272021-04-20Clevx, LlcDoor lock control with wireless user authentication
US10997810B2 (en)2019-05-162021-05-04The Chamberlain Group, Inc.In-vehicle transmitter training
US11074773B1 (en)2018-06-272021-07-27The Chamberlain Group, Inc.Network-based control of movable barrier operators for autonomous vehicles
US20210272401A1 (en)*2017-08-012021-09-02The Chamberlain Group, Inc.System and Method for Facilitating Access to a Secured Area
US11151231B2 (en)2007-09-272021-10-19Clevx, LlcSecure access device with dual authentication
US11190936B2 (en)2007-09-272021-11-30Clevx, LlcWireless authentication system
US11220856B2 (en)2019-04-032022-01-11The Chamberlain Group LlcMovable barrier operator enhancement device and method
US11261648B2 (en)2019-12-202022-03-01The Chamberlain Group LlcMovable barrier disengagement detection
US20220114847A1 (en)*2020-10-132022-04-14Igloo Products Corp.Smart box
US11423717B2 (en)*2018-08-012022-08-23The Chamberlain Group LlcMovable barrier operator and transmitter pairing over a network
US11574512B2 (en)2017-08-012023-02-07The Chamberlain Group LlcSystem for facilitating access to a secured area
US11600126B2 (en)2020-05-082023-03-07The Chamberlain Group LlcMovable barrier operator system and methods of installation and use
US11778464B2 (en)2017-12-212023-10-03The Chamberlain Group LlcSecurity system for a moveable barrier operator
US12133603B2 (en)2021-04-232024-11-05Gmi Holdings, Inc.Systems and methods for providing secure access to a receptacle

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP3388987A1 (en)*2017-04-122018-10-17Deutsche Post AGSupport for the storage and location of objects in a storage facility
DE102017128775A1 (en)*2017-12-042019-06-06Deutsche Post Ag Method and apparatus for a shipment storage device
EP3564878A1 (en)*2018-05-032019-11-06Novoferm GmbHMethod, system and computer program for routing a delivery to a destination
DE102020100891A1 (en)2020-01-162021-07-22Audi Aktiengesellschaft Method for operating a vehicle storage facility for a motor vehicle and a motor vehicle for this purpose

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6233568B1 (en)*1994-01-032001-05-15E-Stamp CorporationSystem and method for automatically providing shipping/transportation fees
US6542933B1 (en)*1999-04-052003-04-01Neomedia Technologies, Inc.System and method of using machine-readable or human-readable linkage codes for accessing networked data resources
US20050264400A1 (en)*2002-06-142005-12-01Sentrilock, Inc.Electronic lock system and method for its use with a secure memory card
US7035835B2 (en)*2003-06-122006-04-25Winbond Electronics CorporationHigh-precision current-mode pulse-width-modulation circuit

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6233568B1 (en)*1994-01-032001-05-15E-Stamp CorporationSystem and method for automatically providing shipping/transportation fees
US6542933B1 (en)*1999-04-052003-04-01Neomedia Technologies, Inc.System and method of using machine-readable or human-readable linkage codes for accessing networked data resources
US20050264400A1 (en)*2002-06-142005-12-01Sentrilock, Inc.Electronic lock system and method for its use with a secure memory card
US7035835B2 (en)*2003-06-122006-04-25Winbond Electronics CorporationHigh-precision current-mode pulse-width-modulation circuit

Cited By (37)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11151231B2 (en)2007-09-272021-10-19Clevx, LlcSecure access device with dual authentication
US12437040B2 (en)2007-09-272025-10-07Clevx, LlcSecure access device with multiple authentication mechanisms
US10985909B2 (en)*2007-09-272021-04-20Clevx, LlcDoor lock control with wireless user authentication
US11971967B2 (en)2007-09-272024-04-30Clevx, LlcSecure access device with multiple authentication mechanisms
US11233630B2 (en)2007-09-272022-01-25Clevx, LlcModule with embedded wireless user authentication
US11190936B2 (en)2007-09-272021-11-30Clevx, LlcWireless authentication system
US20180178753A1 (en)*2015-07-082018-06-28Volkswagen AktiengesellschaftMethod, control apparatus and vehicle
US10300885B2 (en)*2015-07-082019-05-28Volkswagen AktiengesellschaftMethod, control apparatus and vehicle
US10167661B2 (en)*2016-10-202019-01-01Tti (Macao Commercial Offshore) LimitedSystems and methods for controlling garage door opener operations
US20180112454A1 (en)*2016-10-202018-04-26Tti (Macao Commercial Offshore) LimitedSystems and methods for controlling garage door opener operations
US20210272401A1 (en)*2017-08-012021-09-02The Chamberlain Group, Inc.System and Method for Facilitating Access to a Secured Area
US20250118123A1 (en)*2017-08-012025-04-10The Chamberlain Group LlcSystem and Method for Facilitating Access to a Secured Area
US12106623B2 (en)2017-08-012024-10-01The Chamberlain Group LlcSystem and method for facilitating access to a secured area
US11941929B2 (en)*2017-08-012024-03-26The Chamberlain Group LlcSystem for facilitating access to a secured area
US20230177899A1 (en)*2017-08-012023-06-08The Chamberlain Group LlcSystem For Facilitating Access to a Secured Area
US11562610B2 (en)*2017-08-012023-01-24The Chamberlain Group LlcSystem and method for facilitating access to a secured area
US11574512B2 (en)2017-08-012023-02-07The Chamberlain Group LlcSystem for facilitating access to a secured area
US12108248B2 (en)2017-12-212024-10-01The Chamberlain Group LlcSecurity system for a moveable barrier operator
US11778464B2 (en)2017-12-212023-10-03The Chamberlain Group LlcSecurity system for a moveable barrier operator
CN108460872A (en)*2018-03-062018-08-28宁夏慧百通赢科技有限公司The control method and device of smart lock
CN108460872B (en)*2018-03-062021-08-17枣庄市民卡管理运营有限公司Control method and device of intelligent lock
US11763616B1 (en)2018-06-272023-09-19The Chamberlain Group LlcNetwork-based control of movable barrier operators for autonomous vehicles
US12056971B1 (en)2018-06-272024-08-06The Chamberlain Group Llc.Network-based control of movable barrier operators for autonomous vehicles
US11074773B1 (en)2018-06-272021-07-27The Chamberlain Group, Inc.Network-based control of movable barrier operators for autonomous vehicles
US20220375287A1 (en)*2018-08-012022-11-24The Chamberlain Group LlcMovable Barrier Operator and Transmitter Pairing Over a Network
US11423717B2 (en)*2018-08-012022-08-23The Chamberlain Group LlcMovable barrier operator and transmitter pairing over a network
US11869289B2 (en)*2018-08-012024-01-09The Chamberlain Group LlcMovable barrier operator and transmitter pairing over a network
US12354422B2 (en)*2018-08-012025-07-08The Chamberlain Group LlcMovable barrier operator and transmitter pairing over a network
US20240177548A1 (en)*2018-08-012024-05-30The Chamberlain Group LlcMovable barrier operator and transmitter pairing over a network
US11220856B2 (en)2019-04-032022-01-11The Chamberlain Group LlcMovable barrier operator enhancement device and method
US11462067B2 (en)2019-05-162022-10-04The Chamberlain Group LlcIn-vehicle transmitter training
US10997810B2 (en)2019-05-162021-05-04The Chamberlain Group, Inc.In-vehicle transmitter training
US11261648B2 (en)2019-12-202022-03-01The Chamberlain Group LlcMovable barrier disengagement detection
US12020524B2 (en)2020-05-082024-06-25The Chamberlain Group Llc.Movable barrier operator system and methods of installation and use
US11600126B2 (en)2020-05-082023-03-07The Chamberlain Group LlcMovable barrier operator system and methods of installation and use
US20220114847A1 (en)*2020-10-132022-04-14Igloo Products Corp.Smart box
US12133603B2 (en)2021-04-232024-11-05Gmi Holdings, Inc.Systems and methods for providing secure access to a receptacle

Also Published As

Publication numberPublication date
US20170323502A1 (en)2017-11-09

Similar Documents

PublicationPublication DateTitle
US9811958B1 (en)Apparatus enabling secure wireless access to an enclosure
US10922642B2 (en)System and method for linking an event to video documenting the event
US20150235173A1 (en)Automated Tracking-Number Based Administration of Access Codes
US10997547B2 (en)System and method for detecting potentially unauthorized access to an enclosure
US20150235495A1 (en)System and Method for Partially Opening an Access Barrier
US20150235172A1 (en)System and Method for Detecting Potentially Unauthorized Access to an Enclosure
US10783479B2 (en)System and method for delivering a package
US20180285814A1 (en)System and method for detecting potentially unauthorized access to an enclosure
US11144873B2 (en)Package management system with accelerated delivery
US10643415B2 (en)Package management system with accelerated delivery
US12417425B2 (en)System and method for conditional delivery of a transport container
US10217303B1 (en)System and method for delivery of goods with automatic access code expiration
US20180367419A1 (en)Automated tracking-number based administration of access codes
US9619955B2 (en)Systems and methods for facilitating package delivery or pickup
US10515335B2 (en)Secured delivery locker
CN106664507B (en) Enabled node delivery of notifications using elements of the wireless node network
US11797916B2 (en)Systems and methods of package container return
US20200250615A1 (en)Package Management System with Accelerated Delivery
US20150120601A1 (en)Electronically controlled parcel delivery system
US20190132714A1 (en)System and method for using a monitoring device to efficiently manage and assure the safety, quality and security of goods stored within a truck, tractor or trailer transported via a roadway
CN108352000A (en)It is dispensed in the air to nobody of safety place
US8271342B2 (en)Delivery management system and method using smart communicator
JP5254293B2 (en) Food distribution management system
US20180247262A1 (en)Central monitoring system and method for efficiently managing and assuring the safety, quality and security of goods stored within a truck, tractor or trailer
US20180308045A1 (en)Mobile application with enhanced user interface for efficiently managing and assuring the safety, quality and security of goods stored within a truck, tractor or trailer and assessing user compliance with regulations and quality of performance

Legal Events

DateCodeTitleDescription
STCFInformation on status: patent grant

Free format text:PATENTED CASE

ASAssignment

Owner name:HALL LABS LLC, UTAH

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HALL, MARK;REEL/FRAME:046219/0105

Effective date:20180627

ASAssignment

Owner name:HALL LABS LLC, UTAH

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BOSWELL, CRAIG;REEL/FRAME:046433/0447

Effective date:20180720

ASAssignment

Owner name:HALL LABS LLC, UTAH

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HALL, DAVID R.;REEL/FRAME:047058/0053

Effective date:20180911

ASAssignment

Owner name:HALL LABS LLC, UTAH

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HALL, DAVID R.;REEL/FRAME:047132/0022

Effective date:20180911

ASAssignment

Owner name:HALL LABS LLC, UTAH

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KNIGHT, JEDEDIAH;REEL/FRAME:046989/0983

Effective date:20180926

Owner name:HALL LABS LLC, UTAH

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FOX, JOE;REEL/FRAME:047157/0931

Effective date:20180811

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPPFee payment procedure

Free format text:SURCHARGE FOR LATE PAYMENT, SMALL ENTITY (ORIGINAL EVENT CODE: M2554); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment:4

ASAssignment

Owner name:HALL LABS LLC, UTAH

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FOX, JOE;REEL/FRAME:060392/0783

Effective date:20220622

ASAssignment

Owner name:RICHMOND VALLEY LLC, UTAH

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HALL LABS LLC;REEL/FRAME:066071/0107

Effective date:20240108

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY


[8]ページ先頭

©2009-2025 Movatter.jp